Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at iu.edu
Reza ShokriNational University of Singapore; MicrosoftVerified email at comp.nus.edu.sg
Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Paul GrubbsUniversity of MichiganVerified email at umich.edu
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Xiaorui PanIndiana UniversityVerified email at indiana.edu
Diyue BuPh.D. of bioinformatics, Indiana University; Veracyte Inc SSFVerified email at veracyte.com
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyVerified email at rit.edu
Shantanu RaneResearch Area Manager, Cyber-Physical Systems Security, Xerox PARC.Verified email at parc.com
Yinqian ZhangProfessor, Southern University of Science and TechnologyVerified email at acm.org
Guoxing ChenAssistant Professor of Computer Science & Engineering Department, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Wenhao WangInstitute of Information Engineering, CASVerified email at iie.ac.cn
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Kevin SekniqiPhD Computer Science, Cornell UniversityVerified email at sekniqi.com
Kévin HugueninProfessor, Université de Lausanne (UNIL)Verified email at unil.ch
Julien FreudigerGoogleVerified email at frdgr.ch
Follow
Vincent Bindschaedler
Assistant Professor at the University of Florida
Verified email at cise.ufl.edu - Homepage